US10812476B2 - Authorization of another device for participation in multi-factor authentication - Google Patents

Authorization of another device for participation in multi-factor authentication Download PDF

Info

Publication number
US10812476B2
US10812476B2 US15/985,913 US201815985913A US10812476B2 US 10812476 B2 US10812476 B2 US 10812476B2 US 201815985913 A US201815985913 A US 201815985913A US 10812476 B2 US10812476 B2 US 10812476B2
Authority
US
United States
Prior art keywords
mobile device
factor
secret
authentication process
factor authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US15/985,913
Other versions
US20190364034A1 (en
Inventor
Joshua David Alexander
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Salesforce Inc
Original Assignee
Salesforce com Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Salesforce com Inc filed Critical Salesforce com Inc
Priority to US15/985,913 priority Critical patent/US10812476B2/en
Assigned to SALESFORCE.COM, INC. reassignment SALESFORCE.COM, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALEXANDER, JOSHUA DAVID
Publication of US20190364034A1 publication Critical patent/US20190364034A1/en
Application granted granted Critical
Publication of US10812476B2 publication Critical patent/US10812476B2/en
Assigned to SALESFORCE, INC. reassignment SALESFORCE, INC. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SALESFORCE.COM, INC.
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/082Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication

Definitions

  • Embodiments described herein relate to multi-factor authentication systems, and more particularly, to authorizing the participation of a mobile device as a factor in a multi-factor authentication process.
  • One technique used to improve authentication systems is multi-factor authentication.
  • the authentication server may then send an out-of-band communication as a second factor, e.g., to another device associated with the account.
  • the authentication server may send a passcode to a device registered to the user, which the user may enter on the same device used to enter the account credentials.
  • the user may respond directly via the registered device. Access to the particular server may be granted only if the correct account credentials are entered and the second factor via the registered device is successfully verified.
  • FIG. 1 illustrates a block diagram of exemplary authorization of a mobile device for use as a factor in a multi-factor authentication process, according to some embodiments.
  • FIG. 2 shows a flow diagram of exemplary server communications with a first mobile device to facilitate authorization of a second mobile device, according to some embodiments.
  • FIGS. 3A-3D depict diagrams of various exemplary user interfaces, according to some embodiments.
  • FIG. 4 is a flow diagram illustrating an exemplary server-side method for authorizing a mobile device to participate in a multi-factor authentication process, according to some embodiments.
  • FIG. 5 is a flow diagram illustrating an exemplary mobile-side method for facilitating authorization of another device, according to some embodiments.
  • FIG. 6 is a flow diagram illustrating an exemplary mobile-side method for authorizing a mobile device, according to some embodiments.
  • FIG. 7 is a block diagram illustrating an exemplary computing device, according to some embodiments.
  • Multi-factor authentication schemes are often used by online service providers in an attempt to identify account owners and other users of their online services accurately.
  • One form of multi-factor authentication involves contacting a secondary computing device (e.g., a mobile device) that the user registers with the account upon a new account creation.
  • a secondary computing device e.g., a mobile device
  • UI account sign-in user interface
  • the server sends a code (e.g., via a short message service) to the registered mobile device (e.g., a mobile phone, tablet computer, wearable device, or other similar device).
  • the user reads the code from the mobile device and enters it into the UI of the online service.
  • an existing registered device is used to facilitate authorization of another mobile device for participation in a multi-factor authentication scheme.
  • the existing registered device may be used to show proximity between the existing device and the new device.
  • an authentication server may be used to facilitate replacement of an older mobile device with a new mobile device or the addition of another mobile device in a multi-factor authentication process.
  • the user of the old mobile device may use disclosed techniques to replace the old mobile device with the new mobile device.
  • the user of the old mobile device may use disclosed techniques to add the new device for participation in a multi-factor authentication process along with an existing device.
  • the disclosed techniques may advantageously provide improvements in security when adding or replacing a device as a factor in multi-factor authentication schemes.
  • the disclosed techniques may reduce or eliminate fraudulent addition of devices by showing proximity or ownership relative to an already-authorized device.
  • FIG. 1 This disclosure initially describes, with reference to FIG. 1 , authorization of a mobile device for a multi-factor authentication process. Communication between an authentication server and two mobile devices is discussed with reference to FIG. 2 .
  • FIGS. 3A-3D facilitate the discussion of various UIs.
  • FIGS. 4-6 illustrate exemplary methods and FIG. 7 shows an exemplary computing device.
  • FIG. 1 is a block diagram illustrating an exemplary system 100 in which a device may be authorized to participate in a multi-factor authentication process, according to some embodiments.
  • system 100 includes authentication system 100 , a first mobile device 120 , and a second mobile device 130 .
  • first mobile device 120 and authentication server 110 exchange one or more communications for a multi-factor authentication process, as shown at 112 .
  • authentication server 110 may send a passcode to first mobile device 120 or request and receive a permission response from first mobile device 120 .
  • server 110 receives a request (not explicitly shown) from first mobile device 120 to authorize a second mobile device as a factor in the multi-factor authentication process.
  • server 110 sends a secret 114 to device 120 based on such a request.
  • the secret may be pseudo-randomly and/or cryptographically generated.
  • the secret may be pre-established with device 120 , e.g., using public/private key cryptography or some other technique.
  • the first mobile device 120 includes a display unit 122 .
  • unit 122 displays an image that is generated based on the secret transmitted by the authentication server 110 .
  • the image may display the secret or represent a value that is encoded based on the secret (e.g., as a QR code).
  • the second mobile device 130 includes camera unit 132 .
  • camera unit 132 is configured to capture images based on commands from device 130 .
  • second mobile device 130 uses camera unit 132 to capture an image of the display unit 122 . In some embodiments, this may show proximity of devices 120 and 130 .
  • device 130 transmits information 116 determined from the captured image to authentication server 110 .
  • the information may specify the secret or may be derived from the secret (e.g., in such a manner that authentication server 110 can verify that the secret was used to generate information 116 ).
  • authentication server 110 authorizes device 130 for participation as a factor in a multi-factor authentication process based on the received information 116 .
  • server 110 exchanges communication(s) 118 with second mobile device 130 .
  • communication for subsequent processes includes authentication server 110 sending a permission request to the second mobile device as a factor in the authentication process and device 130 may send a response (e.g., a grant or denial) to the authentication server 110 for the request.
  • communication for subsequent processes includes sending a passcode to the device 130 , e.g., for entry via a login screen of another device.
  • a multi-factor authentication example in which a user sends a request from a personal computer (PC) to a previously authorized first mobile device as a factor in a multi-factor authentication process.
  • the user utilizes the first mobile device as a second factor in the process (and the process may or may not be successful to authenticate the user).
  • the user may want to add a second mobile device to participate in the multi-factor authentication process.
  • the user may authorize the participation of a second mobile device as a factor in the multi-factor authentication process, e.g., by capturing an image of the display of the first mobile device.
  • the second mobile device may be used for the second factor instead of the first mobile device or may be used as a third factor in addition to the second factor.
  • the second mobile device 130 generates additional information based on capturing the image displayed by the first mobile device 120 .
  • This information may include, for example: the time the image was taken, the number of times the capture was attempted for the code displayed on unit 122 , a derivation of the secret used to generate the code, etc.
  • one or more of these exemplary types of information may be included in information 116 .
  • mobile device 120 may also send parameters to server 110 for authorization of device 130 .
  • These parameters may specify, for example, a desired type of authentication participation for device 130 (e.g., passcode, biometric code, etc.), the length of time the second mobile device should be authorized to participate in the process, whether device 120 should remain authorized to participate in the multi-factor authentication process, etc.
  • the server 110 may determine whether to authorize device 130 based on the additional information from device 130 and/or may configure the authorization according to the parameters from mobile device 120 .
  • server 110 creates a secure channel with the first mobile device to transmit the secret. For example, before transmitting a secret to the first mobile device 120 , authentication server 110 may encrypt the secret. In some embodiments, authentication server 110 creates a secure channel with the second mobile device 130 for communication for subsequent multi-factor authentication processes.
  • FIG. 2 is a communications diagram illustrating exemplary communication between an authentication server and two mobile devices, according to some embodiments.
  • authentication server 110 first mobile device 120 , and second mobile device 130 communicate to authorize device 130 for participation in a multi-factor authentication process.
  • authentication server 110 receives a response for a factor in a multi-factor authentication process from first mobile device 120 .
  • authentication server sends a permission request to first mobile device 120 after a user has logged into an account using login information (e.g., username and password).
  • server 110 Based on receiving the response, in the illustrated embodiment, server 110 generates an authentication decision, at 210 , for the multi-factor authentication process based at least in part on the response from device 120 .
  • device 120 may participate as a factor in the process indirectly, e.g., by receiving a code that a user enters into a login screen of another device.
  • Elements 222 and 210 in the illustrated example, may not be part of the authorization of second mobile device 130 , but are included to show that the first mobile device 120 is already authorized to participate as a factor in the authentication process, in this example.
  • first mobile device 120 sends a request to authorize a second mobile device 130 to server 110 .
  • the request may include one or more parameters indicating how second mobile device 130 should participate, once authorized.
  • server 110 in response to the request from first mobile device 120 , server 110 generates a secret.
  • the secret may be stored using any of various appropriate formats.
  • server 110 transmits the generated secret to the first mobile device 120 .
  • first mobile device 120 generates a code based on the transmitted secret.
  • first mobile device 120 displays the code.
  • codes Non-limiting examples of the types of codes that may be generated at 226 include: a two-dimensional code (e.g., a quick response (QR) code), a one-dimensional code (e.g., a traditional barcode), a visual pattern (e.g., an image of a known object), a passcode, a passphrase, etc.
  • the code is the secret while in other embodiments the code is derived from the secret.
  • second mobile device 130 scans the code displayed by first mobile device 120 .
  • Various scanning devices may be used including, without limitation: barcode scanners, different types of cameras, etc.
  • the secret may be used to generate a non-image code, such as a numeric passcode which may or may not be scanned.
  • a non-image code may allow for verbal communication of a displayed code (e.g., a passcode) by the first mobile device user to the second mobile device user, in other embodiments.
  • a non-image embodiment may allow for the user of the second mobile device to visually obtain the passcode from the first mobile device and manually enter the passcode into the second mobile device.
  • second mobile device 130 transmits information determined based on the scan of the code by the second mobile device. This information may include the original secret, information specified by the code, information derived from the code, etc.
  • authentication server 110 verifies the information received from the second mobile device 130 based on the secret generated at 212 .
  • the secret is a limited-use secret.
  • the secret may have a limited-use (or even single-use) such that once a device has used the secret a threshold number of times, the secret can no longer be used to authorize other devices.
  • the secret is also limited in time duration (e.g., server 110 may also verify that the transmitted information was received within a threshold time interval of generating or sending the secret).
  • authentication server 110 if the threshold number of uses and the time interval is not exceeded, authentication server 110 is configured to authorize the second mobile device 130 for participation in a multi-factor authentication process.
  • the authentication server 110 sends a request for a non-first factor authentication to the second mobile device, after adding the second mobile device as a factor in the multi-factor authentication process.
  • authorization of the second mobile device for participation in the multi-factor authentication process is denied.
  • authentication server 110 sends a request as a factor in a subsequent multi-factor authentication process for a first account to second mobile device 130 .
  • second mobile device 130 performs one or more operations as a factor in a multi-factor authentication process for a first account, in response to receiving the request from authentication server 110 .
  • the request of 218 may be sent instead of a request to the first mobile device 120 or in conjunction with the request to device 120 .
  • the request at 218 may not be sent and server 110 may otherwise communicate with the second mobile device 130 as a factor in the multi-factor authentication process.
  • a camera unit is used by the new device to capture an image of a display of an old device.
  • This is one example of a technique to show proximity between the devices, but other techniques may be used to show proximity for authorization of the new device.
  • the proximity of the second mobile device may be determined using short-range wireless communications or signature detection, e.g., using Near-Field Communication (NFC) or Bluetooth Low Energy (BLE).
  • NFC Near-Field Communication
  • BLE Bluetooth Low Energy
  • proximity may be determined by reporting location data or some other method.
  • a new device is authorized to participate in multi-factor authentication without showing proximity.
  • the server 110 may send a code to the first mobile device 120 that the user may enter into the second device 130 and send to the server 110 . This may not show proximity (e.g., the user may tell the code to another user over the phone) but may show ownership of device 120 or communications with an authorized user of device 120 .
  • FIGS. 3A-3D depict diagrams of various exemplary UIs according to some embodiments.
  • displays 310 and 320 show an exemplary UI for the first mobile device 120 as a factor in a multi-factor authentication process for a first account.
  • displays 330 and 340 show an exemplary UI for second mobile device 130 in the multi-authentication process for the first account.
  • display 310 of the first mobile device includes graphical element 312 , which the user may select to initiate authorization of another mobile device to participate as a factor.
  • element 312 allows user of the first mobile device to send a request to a server to authorize another mobile device as a factor in the multi-factor authentication process for the first account.
  • the UI may also display a list of mobile devices that may potentially be authorized, e.g., based on their association with accounts of the user, proximity to the first mobile device 120 , etc.
  • the user selects a mobile device from the list of nearby mobile devices, displayed on display 310 , for authorization to participate as a factor in the multi-factor authentication process for the first account.
  • the UI may allow the user to enter other information identifying the second mobile device 130 , such as its phone number.
  • QR code 322 encodes the phrase “This is an example QR code.”
  • the QR code 322 on display 320 is generated by the authentication server and transmitted to the first mobile device, when the user of the first mobile device touches element 312 (as seen in FIG. 3A ).
  • mobile device 120 generates the QR code 322 based on a secret.
  • the QR code 322 on display 320 is scanned by another mobile device (e.g., the second mobile device 130 ) in order to authorize the other mobile device for participation in multi-factor authentication.
  • display 330 includes element 332 , which the user may select to capture a code in order to set up the second mobile device for the multi-factor authentication process.
  • the second mobile device when the user of the second mobile device selects element 332 , the second mobile device is ready to scan the QR code 322 on display 320 of the first mobile device.
  • the second mobile device once the second mobile device has scanned the QR code 322 on display 320 , it may communicate with the authentication server 110 in order to be authorized to participate as a factor in the multi-factor authentication process for the first account.
  • the second mobile device is authorized to participate in the multi-factor authentication process by a different technique (as described in FIG. 3D ) than scanning a QR code.
  • display 340 includes a prompt 342 , which may be displayed when device 130 participates as an authentication factor (e.g., after it has been authorized).
  • prompt 342 asks the user to enter a six-digit code “XYZ123” to authenticate login to an account “ABC.”
  • similar techniques may be used to authorize device 130 initially (e.g., by displaying a similar prompt on device 120 and entering the code on device 130 ).
  • authentication server 110 may determine to automatically verify a factor instead of contacting mobile device 120 or mobile device 130 and may determine to automatically respond to a permission request without user input, based on a current location of mobile device 130 .
  • a device when authorized to participate as a factor in a multi-factor authentication process, it may or may not actually receive user input for the process.
  • the user of the first mobile device may authorize a new mobile device to replace the first mobile device.
  • the user of the first mobile device is able to authorize the new mobile device as the primary mobile device or the only mobile device.
  • authorization of the new device is successful, replacing the first mobile device, and allowing the user to use the new mobile device instead of the first mobile device.
  • the user of the first mobile device may authorize a secondary mobile device to use in combination with the first mobile device.
  • the user of the first mobile device purchases a wearable mobile device (e.g., a smart watch).
  • the new mobile device may not replace the first mobile device. Rather, both devices may be used for one or more factors, which may be dependent or independent.
  • a wearable may participate for a first factor and a mobile phone may participate for a second, independent factor.
  • proximity between the two devices may itself be a factor in the multi-factor authentication process.
  • FIG. 4 is a flow diagram illustrating an exemplary server-side method for authorizing a mobile device to participate in a multi-factor authentication process, according to some embodiments.
  • the method shown in FIG. 4 may be used in conjunction with any of the computer circuitry, systems, devices, elements, or components disclosed herein, among other devices.
  • some of the method elements shown may be performed concurrently, in a different order than shown, or may be omitted. Additional method elements may also be performed as desired.
  • a server (e.g., server 110 ) generates an authentication decision for a multi-factor authentication process for a first account, wherein generating the authentication decision includes communicating with a first mobile device as a factor in the multi-factor authentication process.
  • the server in response to a request to authorize participation of a second mobile device as a factor in the multi-factor authentication process for the first account, the server generates a secret and transmits the secret to the first mobile device.
  • the server receives information from the second mobile device, wherein the information is generated based on capturing an image of a display by the first mobile device and wherein the display is based on the transmitted secret.
  • the server verifies content of the information using the secret.
  • the second mobile device determines the secret generated by the authentication server based on the captured code.
  • the second mobile device sends the determined secret to the authentication server.
  • the authentication server verifies the secret against the original secret it created.
  • the server verifies that the information is received within a determined time interval from transmitting the secret to the first mobile device.
  • the server authorizes participation of the second mobile device as a factor in the multi-factor authentication process for the first account.
  • the server communicates with the second mobile device as a factor in a subsequent multi-factor authentication process for the first account.
  • the secret is a limited use secret, where the verification of the information involves verifying that the secret has not been used more than a threshold number of times.
  • the display by the first mobile device uses a display unit of the first mobile device and is an image of a two-dimensional code generated based on the secret.
  • the factor is a non-first factor of the multi-factor authentication process.
  • the authentication server sends a second secret to the second mobile device in response to a request to authorize participation of a third mobile device as a factor in the multi-factor authentication process. (Said another way, once a device is authorized to participate in an authorization process, it may be used to authorize additional devices).
  • the authentication server is then configured to receive information from the third mobile device that indicates having been generated based on capturing an image of a display by the second mobile device. In some embodiments, the authentication server verifies the information based on the second secret and the determined time interval. In some embodiments, the authentication server encrypts the secret before sending it to the first mobile device.
  • FIG. 5 illustrates an exemplary method for facilitating authorization of another device to participate in an authentication process, according to some embodiments.
  • the method shown in FIG. 5 may be used in conjunction with any of the computer circuitry, systems, devices, elements, or components disclosed herein, among other devices.
  • some of the method elements shown may be performed concurrently, in a different order than shown, or may be omitted. Additional method elements may also be performed as desired.
  • a computing device receives a request from an authentication server as a factor in the multi-factor authentication process for the first account.
  • the device communicates as a factor in a multi-factor authentication process for the first account.
  • the device sends a request to the authentication server to authorize participation of a second mobile device as a factor in the multi-factor authentication process for the first account.
  • the request includes configuration information specifying the type of participation that the second mobile device may be authorized for.
  • the second mobile device may be authorized to participate as a factor in the multi-factor authentication process by manual authentication, location authentication, connectivity authentication, etc.
  • the configuration information specifies whether one or both of the mobile devices (e.g., the first mobile device and/or the second mobile device) are required to participate in the multi-factor authentication process.
  • the device receives a secret from the authentication server.
  • the device generates a code based on the received secret.
  • the device displays the generated code.
  • FIG. 6 illustrates an exemplary method for authorization of a device, according to some embodiments.
  • the method shown in FIG. 6 may be used in conjunction with any of the computer circuitry, systems, devices, elements, or components disclosed herein, among other devices.
  • some of the method elements shown may be performed concurrently, in a different order than shown, or may be omitted. Additional method elements may also be performed as desired.
  • a computing device e.g., device 130 captures an image of a visual pattern displayed by a mobile device to authorize participation of the computing device in a multi-factor authentication process for a first account, wherein the mobile device is previously authorized to participate as a factor in the multi-factor authentication process and wherein the visual pattern is based on a secret transmitted to the mobile device from an authentication server.
  • the device processes the captured image and sends information to the authentication server based on the captured image as evidence of physical proximity to the mobile device.
  • the device receives a request as a factor in a subsequent multi-factor authentication process for the first account.
  • the device processes the captured image by determining the secret based on the visual pattern. In some embodiments, after determining the secret, the device sends information, including the determined secret, to the authentication server. In some embodiments, the device receives a non-first factor request from the authentication server for the multi-factor authentication process for the first account.
  • FIG. 7 a block diagram of a computing device (which may also be referred to as a computing system) 710 is depicted, according to some embodiments.
  • Computing device 710 may be used to implement various portions of this disclosure.
  • Computing device 710 is one example of a device that may be used as a mobile device, a server computer system, a client computer system, or any other computing system implementing portions of this disclosure.
  • Computing device 710 may be any suitable type of device, including, but not limited to, a personal computer system, desktop computer, laptop or notebook computer, mobile phone, mainframe computer system, web server, workstation, or network computer. As shown, computing device 710 includes processing unit 750 , storage subsystem 712 , and input/output (I/O) interface 730 coupled via interconnect 760 (e.g., a system bus). I/O interface 730 may be coupled to one or more I/O devices 740 . Computing device 710 further includes network interface 732 , which may be coupled to network 720 for communications with, for example, other computing devices.
  • interconnect 760 e.g., a system bus
  • I/O interface 730 may be coupled to one or more I/O devices 740 .
  • Computing device 710 further includes network interface 732 , which may be coupled to network 720 for communications with, for example, other computing devices.
  • Processing unit 750 includes one or more processors, and in some embodiments, includes one or more coprocessor units. In some embodiments, multiple instances of processing unit 750 may be coupled to interconnect 760 . Processing unit 750 (or each processor within processing unit 750 ) may contain a cache or other form of on-board memory. In some embodiments, processing unit 750 may be implemented as a general-purpose processing unit, and in other embodiments it may be implemented as a special purpose processing unit (e.g., an ASIC). In general, computing device 710 is not limited to any particular type of processing unit or processor subsystem.
  • processing unit or “processing element” refer to circuitry configured to perform operations or to a memory having program instructions stored therein that are executable by one or more processors to perform operations.
  • a processing unit may be implemented as a hardware circuit implemented in a variety of ways.
  • the hardware circuit may include, for example, custom very-large-scale integration (VLSI) circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components.
  • VLSI very-large-scale integration
  • a processing unit may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices, or the like.
  • a processing unit may also be configured to execute program instructions or computer instructions from any suitable form of non-transitory computer-readable media to perform specified operations.
  • Storage subsystem 712 is usable by processing unit 750 (e.g., to store instructions executable by and data used by processing unit 750 ).
  • Storage subsystem 712 may be implemented by any suitable type of physical memory media, including hard disk storage, floppy disk storage, removable disk storage, flash memory, random access memory (RAM-SRAM, EDO RAM, SDRAM, DDR SDRAM, RDRAM, etc.), ROM (PROM, EEPROM, etc.), and so on.
  • Storage subsystem 712 may consist solely of volatile memory in some embodiments.
  • Storage subsystem 712 may store program instructions executable by computing device 710 using processing unit 750 , including program instructions executable to cause computing device 710 to implement the various techniques disclosed herein.
  • I/O interface 730 may represent one or more interfaces and may be any of various types of interfaces configured to couple to and communicate with other devices, according to various embodiments.
  • I/O interface 730 is a bridge chip from a front-side to one or more back-side buses.
  • I/O interface 730 may be coupled to one or more I/O devices 740 via one or more corresponding buses or other interfaces. Examples of I/O devices include storage devices (hard disk, optical drive, removable flash drive, storage array, SAN, or an associated controller), network interface devices, user interface devices or other devices (e.g., graphics, sound, etc.).
  • computing device of FIG. 7 is one embodiment for demonstrating disclosed concepts. In other embodiments, various aspects of the computing device may be different. For example, in some embodiments, additional components, or multiple instances of the illustrated components may be included.
  • Various units, circuits, or other components may be described or claimed as “configured to” perform a task or tasks.
  • “configured to” is used to connote structure by indicating that the units/circuits/components include structure (e.g., circuitry) that performs the task or tasks during operation. As such, the unit/circuit/component can be said to be configured to perform the task even when the specified unit/circuit/component is not currently operational (e.g., is not on).
  • the units/circuits/components used with the “configured to” language include hardware—for example, circuits, memory storing program instructions executable to implement the operation, etc. Reciting that a unit/circuit/component is “configured to” perform one or more tasks is expressly intended not to invoke 35 U.S.C. ⁇ 112(f) for that unit/circuit/component.
  • the term “based on” is used to describe one or more factors that affect a determination. This term does not foreclose the possibility that additional factors may affect the determination. That is, a determination may be solely based on specified factors or based on the specified factors as well as other, unspecified factors.
  • a determination may be solely based on specified factors or based on the specified factors as well as other, unspecified factors.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Techniques are disclosed relating to authenticating a second mobile device for participation in a multi-factor authentication process. In disclosed embodiments, a server generates an authentication decision, based on communicating with a first mobile device as a factor in the multi-factor authentication process. After receiving a request from the first mobile device to authorize participation of a second mobile device in the multi-factor authentication process, the server may generate a secret and transmit the secret to the first mobile device. The server may receive information from the second mobile device, based on the second mobile device capturing an image of a display by the first mobile device, where the display is based on the transmitted secret. In some embodiments, the server then verifies the content of the information using the secret and verifies that the information is received within a determined time interval from transmitting the secret. After verifying the content and the time interval, the server may authorize participation of and communicates with the second mobile device as a factor in the multi-factor authentication process.

Description

BACKGROUND Technical Field
Embodiments described herein relate to multi-factor authentication systems, and more particularly, to authorizing the participation of a mobile device as a factor in a multi-factor authentication process.
Description of the Related Art
User security in accessing private accounts is an ongoing problem for individuals attempting to access their accounts on the internet. Traditionally, a user attempting to access an account enters account credentials consisting of a username and password. However, this information may be easily obtained by another without permission from the user of the account.
One technique used to improve authentication systems is multi-factor authentication. As one example, after a user enters account credentials in an attempt to access a particular account, the authentication server may then send an out-of-band communication as a second factor, e.g., to another device associated with the account. For example, the authentication server may send a passcode to a device registered to the user, which the user may enter on the same device used to enter the account credentials. In another example, the user may respond directly via the registered device. Access to the particular server may be granted only if the correct account credentials are entered and the second factor via the registered device is successfully verified.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrates a block diagram of exemplary authorization of a mobile device for use as a factor in a multi-factor authentication process, according to some embodiments.
FIG. 2 shows a flow diagram of exemplary server communications with a first mobile device to facilitate authorization of a second mobile device, according to some embodiments.
FIGS. 3A-3D depict diagrams of various exemplary user interfaces, according to some embodiments.
FIG. 4 is a flow diagram illustrating an exemplary server-side method for authorizing a mobile device to participate in a multi-factor authentication process, according to some embodiments.
FIG. 5 is a flow diagram illustrating an exemplary mobile-side method for facilitating authorization of another device, according to some embodiments.
FIG. 6 is a flow diagram illustrating an exemplary mobile-side method for authorizing a mobile device, according to some embodiments.
FIG. 7 is a block diagram illustrating an exemplary computing device, according to some embodiments.
DETAILED DESCRIPTION
Multi-factor authentication schemes are often used by online service providers in an attempt to identify account owners and other users of their online services accurately. One form of multi-factor authentication involves contacting a secondary computing device (e.g., a mobile device) that the user registers with the account upon a new account creation. For example, a user may enter typical account credentials (e.g., a user identification and password) into an account sign-in user interface (UI) and if the credentials are valid, the server sends a code (e.g., via a short message service) to the registered mobile device (e.g., a mobile phone, tablet computer, wearable device, or other similar device). In this example, the user reads the code from the mobile device and enters it into the UI of the online service.
In some embodiments, it may be desirable to add another mobile device to replace a previous device or to serve as an additional factor in the multi-factor authentication process. As discussed in further detail below, in some embodiments, an existing registered device is used to facilitate authorization of another mobile device for participation in a multi-factor authentication scheme. For example, the existing registered device may be used to show proximity between the existing device and the new device.
Various embodiments of an authentication server are presented herein. In the disclosed embodiments, an authentication server may be used to facilitate replacement of an older mobile device with a new mobile device or the addition of another mobile device in a multi-factor authentication process. In some examples, the user of the old mobile device may use disclosed techniques to replace the old mobile device with the new mobile device. In other examples, the user of the old mobile device may use disclosed techniques to add the new device for participation in a multi-factor authentication process along with an existing device. In various embodiments, the disclosed techniques may advantageously provide improvements in security when adding or replacing a device as a factor in multi-factor authentication schemes. In particular, the disclosed techniques may reduce or eliminate fraudulent addition of devices by showing proximity or ownership relative to an already-authorized device.
This disclosure initially describes, with reference to FIG. 1, authorization of a mobile device for a multi-factor authentication process. Communication between an authentication server and two mobile devices is discussed with reference to FIG. 2. FIGS. 3A-3D facilitate the discussion of various UIs. FIGS. 4-6 illustrate exemplary methods and FIG. 7 shows an exemplary computing device.
Example Authentication Server
FIG. 1 is a block diagram illustrating an exemplary system 100 in which a device may be authorized to participate in a multi-factor authentication process, according to some embodiments. In the illustrated embodiment, system 100 includes authentication system 100, a first mobile device 120, and a second mobile device 130.
In the illustrated embodiment, first mobile device 120 and authentication server 110 exchange one or more communications for a multi-factor authentication process, as shown at 112. For example, authentication server 110 may send a passcode to first mobile device 120 or request and receive a permission response from first mobile device 120.
In some embodiments, server 110 receives a request (not explicitly shown) from first mobile device 120 to authorize a second mobile device as a factor in the multi-factor authentication process. In the illustrated embodiment, server 110 sends a secret 114 to device 120 based on such a request. The secret may be pseudo-randomly and/or cryptographically generated. In some embodiments, the secret may be pre-established with device 120, e.g., using public/private key cryptography or some other technique.
In the illustrated embodiment, the first mobile device 120 includes a display unit 122. In some embodiments, unit 122 displays an image that is generated based on the secret transmitted by the authentication server 110. For example, the image may display the secret or represent a value that is encoded based on the secret (e.g., as a QR code).
In the illustrated embodiment, the second mobile device 130 includes camera unit 132. In some embodiments, camera unit 132 is configured to capture images based on commands from device 130. In the illustrated embodiment, second mobile device 130 uses camera unit 132 to capture an image of the display unit 122. In some embodiments, this may show proximity of devices 120 and 130.
In the illustrated embodiment, device 130 transmits information 116 determined from the captured image to authentication server 110. The information may specify the secret or may be derived from the secret (e.g., in such a manner that authentication server 110 can verify that the secret was used to generate information 116).
In some embodiments, authentication server 110 authorizes device 130 for participation as a factor in a multi-factor authentication process based on the received information 116. In the illustrated embodiment, for this subsequent multi-factor authentication process, server 110 exchanges communication(s) 118 with second mobile device 130. In some embodiments, communication for subsequent processes includes authentication server 110 sending a permission request to the second mobile device as a factor in the authentication process and device 130 may send a response (e.g., a grant or denial) to the authentication server 110 for the request. In some embodiments, communication for subsequent processes includes sending a passcode to the device 130, e.g., for entry via a login screen of another device.
Consider a multi-factor authentication example in which a user sends a request from a personal computer (PC) to a previously authorized first mobile device as a factor in a multi-factor authentication process. In this example, the user utilizes the first mobile device as a second factor in the process (and the process may or may not be successful to authenticate the user). At a later time, the user may want to add a second mobile device to participate in the multi-factor authentication process. As discussed above, the user may authorize the participation of a second mobile device as a factor in the multi-factor authentication process, e.g., by capturing an image of the display of the first mobile device. Once the second mobile device has been authorized for participation in the multi-factor authentication process, the second mobile device may be used for the second factor instead of the first mobile device or may be used as a third factor in addition to the second factor.
In some embodiments, the second mobile device 130 generates additional information based on capturing the image displayed by the first mobile device 120. This information may include, for example: the time the image was taken, the number of times the capture was attempted for the code displayed on unit 122, a derivation of the secret used to generate the code, etc. In some embodiments, one or more of these exemplary types of information may be included in information 116. In some embodiments, mobile device 120 may also send parameters to server 110 for authorization of device 130. These parameters may specify, for example, a desired type of authentication participation for device 130 (e.g., passcode, biometric code, etc.), the length of time the second mobile device should be authorized to participate in the process, whether device 120 should remain authorized to participate in the multi-factor authentication process, etc. In some embodiments, the server 110 may determine whether to authorize device 130 based on the additional information from device 130 and/or may configure the authorization according to the parameters from mobile device 120.
In some embodiments, server 110 creates a secure channel with the first mobile device to transmit the secret. For example, before transmitting a secret to the first mobile device 120, authentication server 110 may encrypt the secret. In some embodiments, authentication server 110 creates a secure channel with the second mobile device 130 for communication for subsequent multi-factor authentication processes.
Exemplary Server Communication with Two Mobile Devices
FIG. 2 is a communications diagram illustrating exemplary communication between an authentication server and two mobile devices, according to some embodiments. In the illustrated embodiment, authentication server 110, first mobile device 120, and second mobile device 130 communicate to authorize device 130 for participation in a multi-factor authentication process.
At 222, in the illustrated embodiment, authentication server 110 receives a response for a factor in a multi-factor authentication process from first mobile device 120. In some embodiments, authentication server sends a permission request to first mobile device 120 after a user has logged into an account using login information (e.g., username and password). Based on receiving the response, in the illustrated embodiment, server 110 generates an authentication decision, at 210, for the multi-factor authentication process based at least in part on the response from device 120. In other embodiments, device 120 may participate as a factor in the process indirectly, e.g., by receiving a code that a user enters into a login screen of another device. Elements 222 and 210, in the illustrated example, may not be part of the authorization of second mobile device 130, but are included to show that the first mobile device 120 is already authorized to participate as a factor in the authentication process, in this example.
At 224, in the illustrated embodiment, first mobile device 120 sends a request to authorize a second mobile device 130 to server 110. The request may include one or more parameters indicating how second mobile device 130 should participate, once authorized.
At 212, in the illustrated embodiment, in response to the request from first mobile device 120, server 110 generates a secret. The secret may be stored using any of various appropriate formats. At 214, in the illustrated embodiment, server 110 transmits the generated secret to the first mobile device 120.
At 226, in the illustrated embodiment, first mobile device 120 generates a code based on the transmitted secret. At 228, in the illustrated embodiment, first mobile device 120 displays the code. Non-limiting examples of the types of codes that may be generated at 226 include: a two-dimensional code (e.g., a quick response (QR) code), a one-dimensional code (e.g., a traditional barcode), a visual pattern (e.g., an image of a known object), a passcode, a passphrase, etc. In some embodiments, the code is the secret while in other embodiments the code is derived from the secret.
At 232, in the illustrated embodiment, second mobile device 130 scans the code displayed by first mobile device 120. Various scanning devices may be used including, without limitation: barcode scanners, different types of cameras, etc. In some embodiments, the secret may be used to generate a non-image code, such as a numeric passcode which may or may not be scanned. A non-image code may allow for verbal communication of a displayed code (e.g., a passcode) by the first mobile device user to the second mobile device user, in other embodiments. Similarly, a non-image embodiment may allow for the user of the second mobile device to visually obtain the passcode from the first mobile device and manually enter the passcode into the second mobile device.
At 234, in the illustrated embodiment, second mobile device 130 transmits information determined based on the scan of the code by the second mobile device. This information may include the original secret, information specified by the code, information derived from the code, etc. At 216, in the illustrated embodiment, authentication server 110 verifies the information received from the second mobile device 130 based on the secret generated at 212. In some embodiments, the secret is a limited-use secret. For example, the secret may have a limited-use (or even single-use) such that once a device has used the secret a threshold number of times, the secret can no longer be used to authorize other devices. In some embodiments, the secret is also limited in time duration (e.g., server 110 may also verify that the transmitted information was received within a threshold time interval of generating or sending the secret). In some embodiments, if the threshold number of uses and the time interval is not exceeded, authentication server 110 is configured to authorize the second mobile device 130 for participation in a multi-factor authentication process. In some embodiments, the authentication server 110 sends a request for a non-first factor authentication to the second mobile device, after adding the second mobile device as a factor in the multi-factor authentication process. In some embodiments, if the threshold number of uses or the time interval is exceeded, authorization of the second mobile device for participation in the multi-factor authentication process is denied.
At 218, in the illustrated embodiment, authentication server 110 sends a request as a factor in a subsequent multi-factor authentication process for a first account to second mobile device 130. In some embodiments, second mobile device 130 performs one or more operations as a factor in a multi-factor authentication process for a first account, in response to receiving the request from authentication server 110. Note that the request of 218 may be sent instead of a request to the first mobile device 120 or in conjunction with the request to device 120. In other embodiments, the request at 218 may not be sent and server 110 may otherwise communicate with the second mobile device 130 as a factor in the multi-factor authentication process.
In various embodiments discussed above, a camera unit is used by the new device to capture an image of a display of an old device. This is one example of a technique to show proximity between the devices, but other techniques may be used to show proximity for authorization of the new device. For example, the proximity of the second mobile device may be determined using short-range wireless communications or signature detection, e.g., using Near-Field Communication (NFC) or Bluetooth Low Energy (BLE). In still other embodiments, proximity may be determined by reporting location data or some other method. In some embodiments, a new device is authorized to participate in multi-factor authentication without showing proximity. For example, the server 110 may send a code to the first mobile device 120 that the user may enter into the second device 130 and send to the server 110. This may not show proximity (e.g., the user may tell the code to another user over the phone) but may show ownership of device 120 or communications with an authorized user of device 120.
Exemplary User Interface
FIGS. 3A-3D depict diagrams of various exemplary UIs according to some embodiments. In the illustrated embodiment, displays 310 and 320 show an exemplary UI for the first mobile device 120 as a factor in a multi-factor authentication process for a first account. In the illustrated embodiment, displays 330 and 340 show an exemplary UI for second mobile device 130 in the multi-authentication process for the first account.
In FIG. 3A, display 310 of the first mobile device includes graphical element 312, which the user may select to initiate authorization of another mobile device to participate as a factor. In some embodiments, element 312 allows user of the first mobile device to send a request to a server to authorize another mobile device as a factor in the multi-factor authentication process for the first account. In some embodiments, the UI may also display a list of mobile devices that may potentially be authorized, e.g., based on their association with accounts of the user, proximity to the first mobile device 120, etc. In some embodiments, the user selects a mobile device from the list of nearby mobile devices, displayed on display 310, for authorization to participate as a factor in the multi-factor authentication process for the first account. In other embodiments, the UI may allow the user to enter other information identifying the second mobile device 130, such as its phone number.
In FIG. 3B, display 320 of the first mobile device, displays an image of a QR code 322. In the illustrated example, QR code 322 encodes the phrase “This is an example QR code.” In some embodiments, the QR code 322 on display 320 is generated by the authentication server and transmitted to the first mobile device, when the user of the first mobile device touches element 312 (as seen in FIG. 3A). In other embodiments, mobile device 120 generates the QR code 322 based on a secret. In some embodiments, the QR code 322 on display 320 is scanned by another mobile device (e.g., the second mobile device 130) in order to authorize the other mobile device for participation in multi-factor authentication.
In FIG. 3C, display 330 includes element 332, which the user may select to capture a code in order to set up the second mobile device for the multi-factor authentication process. In some embodiments, when the user of the second mobile device selects element 332, the second mobile device is ready to scan the QR code 322 on display 320 of the first mobile device. In some embodiments, once the second mobile device has scanned the QR code 322 on display 320, it may communicate with the authentication server 110 in order to be authorized to participate as a factor in the multi-factor authentication process for the first account. In other embodiments, the second mobile device is authorized to participate in the multi-factor authentication process by a different technique (as described in FIG. 3D) than scanning a QR code.
In FIG. 3D display 340 includes a prompt 342, which may be displayed when device 130 participates as an authentication factor (e.g., after it has been authorized). In the illustrated embodiment, prompt 342 asks the user to enter a six-digit code “XYZ123” to authenticate login to an account “ABC.” In some embodiments, similar techniques may be used to authorize device 130 initially (e.g., by displaying a similar prompt on device 120 and entering the code on device 130).
In some embodiments, various factors in a multi-factor authentication process may be automated. For example, authentication server 110 may determine to automatically verify a factor instead of contacting mobile device 120 or mobile device 130 and may determine to automatically respond to a permission request without user input, based on a current location of mobile device 130. Thus, when a device is authorized to participate as a factor in a multi-factor authentication process, it may or may not actually receive user input for the process.
As discussed above, in some examples, the user of the first mobile device may authorize a new mobile device to replace the first mobile device. In this example, the user of the first mobile device is able to authorize the new mobile device as the primary mobile device or the only mobile device. In this example, authorization of the new device is successful, replacing the first mobile device, and allowing the user to use the new mobile device instead of the first mobile device.
In another example, the user of the first mobile device may authorize a secondary mobile device to use in combination with the first mobile device. For example, the user of the first mobile device purchases a wearable mobile device (e.g., a smart watch). In this example, the new mobile device may not replace the first mobile device. Rather, both devices may be used for one or more factors, which may be dependent or independent. For example, a wearable may participate for a first factor and a mobile phone may participate for a second, independent factor. As another example, proximity between the two devices may itself be a factor in the multi-factor authentication process.
Exemplary Methods
FIG. 4 is a flow diagram illustrating an exemplary server-side method for authorizing a mobile device to participate in a multi-factor authentication process, according to some embodiments. The method shown in FIG. 4 may be used in conjunction with any of the computer circuitry, systems, devices, elements, or components disclosed herein, among other devices. In various embodiments, some of the method elements shown may be performed concurrently, in a different order than shown, or may be omitted. Additional method elements may also be performed as desired.
At 410, in the illustrated embodiment, a server (e.g., server 110) generates an authentication decision for a multi-factor authentication process for a first account, wherein generating the authentication decision includes communicating with a first mobile device as a factor in the multi-factor authentication process.
At 420, in the illustrated embodiment, in response to a request to authorize participation of a second mobile device as a factor in the multi-factor authentication process for the first account, the server generates a secret and transmits the secret to the first mobile device.
At 430, in the illustrated embodiment, the server receives information from the second mobile device, wherein the information is generated based on capturing an image of a display by the first mobile device and wherein the display is based on the transmitted secret.
At 440, in the illustrated embodiment, the server verifies content of the information using the secret. In some embodiments, the second mobile device determines the secret generated by the authentication server based on the captured code. In some embodiments, the second mobile device sends the determined secret to the authentication server. In some embodiments, the authentication server verifies the secret against the original secret it created.
At 450, in the illustrated embodiment, the server verifies that the information is received within a determined time interval from transmitting the secret to the first mobile device.
At 460, in the illustrated embodiment, based on the verification of the content and the time interval, the server authorizes participation of the second mobile device as a factor in the multi-factor authentication process for the first account.
At 470, in the illustrated embodiment, based on the authorization, the server communicates with the second mobile device as a factor in a subsequent multi-factor authentication process for the first account.
In some embodiments, the secret is a limited use secret, where the verification of the information involves verifying that the secret has not been used more than a threshold number of times. In some embodiments, the display by the first mobile device uses a display unit of the first mobile device and is an image of a two-dimensional code generated based on the secret. In some embodiments, the factor is a non-first factor of the multi-factor authentication process. In some embodiments, the authentication server sends a second secret to the second mobile device in response to a request to authorize participation of a third mobile device as a factor in the multi-factor authentication process. (Said another way, once a device is authorized to participate in an authorization process, it may be used to authorize additional devices). In some embodiments, the authentication server is then configured to receive information from the third mobile device that indicates having been generated based on capturing an image of a display by the second mobile device. In some embodiments, the authentication server verifies the information based on the second secret and the determined time interval. In some embodiments, the authentication server encrypts the secret before sending it to the first mobile device.
FIG. 5 illustrates an exemplary method for facilitating authorization of another device to participate in an authentication process, according to some embodiments. The method shown in FIG. 5 may be used in conjunction with any of the computer circuitry, systems, devices, elements, or components disclosed herein, among other devices. In various embodiments, some of the method elements shown may be performed concurrently, in a different order than shown, or may be omitted. Additional method elements may also be performed as desired.
At 510, in the illustrated embodiment, a computing device (e.g., mobile device 120) receives a request from an authentication server as a factor in the multi-factor authentication process for the first account.
At 520, in the illustrated embodiment, the device communicates as a factor in a multi-factor authentication process for the first account.
At 530, in the illustrated embodiment, the device sends a request to the authentication server to authorize participation of a second mobile device as a factor in the multi-factor authentication process for the first account. In some embodiments, the request includes configuration information specifying the type of participation that the second mobile device may be authorized for. For example, the second mobile device may be authorized to participate as a factor in the multi-factor authentication process by manual authentication, location authentication, connectivity authentication, etc. In some embodiments, the configuration information specifies whether one or both of the mobile devices (e.g., the first mobile device and/or the second mobile device) are required to participate in the multi-factor authentication process.
At 540, in the illustrated embodiment, the device receives a secret from the authentication server.
At 550, in the illustrated embodiment, the device generates a code based on the received secret.
At 560, in the illustrated embodiment, the device displays the generated code.
FIG. 6 illustrates an exemplary method for authorization of a device, according to some embodiments. The method shown in FIG. 6 may be used in conjunction with any of the computer circuitry, systems, devices, elements, or components disclosed herein, among other devices. In various embodiments, some of the method elements shown may be performed concurrently, in a different order than shown, or may be omitted. Additional method elements may also be performed as desired.
At 610, in the illustrated embodiment, a computing device (e.g., device 130) captures an image of a visual pattern displayed by a mobile device to authorize participation of the computing device in a multi-factor authentication process for a first account, wherein the mobile device is previously authorized to participate as a factor in the multi-factor authentication process and wherein the visual pattern is based on a secret transmitted to the mobile device from an authentication server.
At 620, in the illustrated embodiment, the device processes the captured image and sends information to the authentication server based on the captured image as evidence of physical proximity to the mobile device.
At 630, in the illustrated embodiment, based on verification by the authentication server of the information, the device receives a request as a factor in a subsequent multi-factor authentication process for the first account.
In some embodiments, the device processes the captured image by determining the secret based on the visual pattern. In some embodiments, after determining the secret, the device sends information, including the determined secret, to the authentication server. In some embodiments, the device receives a non-first factor request from the authentication server for the multi-factor authentication process for the first account.
Exemplary Computing Device
Turning now to FIG. 7, a block diagram of a computing device (which may also be referred to as a computing system) 710 is depicted, according to some embodiments. Computing device 710 may be used to implement various portions of this disclosure. Computing device 710 is one example of a device that may be used as a mobile device, a server computer system, a client computer system, or any other computing system implementing portions of this disclosure.
Computing device 710 may be any suitable type of device, including, but not limited to, a personal computer system, desktop computer, laptop or notebook computer, mobile phone, mainframe computer system, web server, workstation, or network computer. As shown, computing device 710 includes processing unit 750, storage subsystem 712, and input/output (I/O) interface 730 coupled via interconnect 760 (e.g., a system bus). I/O interface 730 may be coupled to one or more I/O devices 740. Computing device 710 further includes network interface 732, which may be coupled to network 720 for communications with, for example, other computing devices.
Processing unit 750 includes one or more processors, and in some embodiments, includes one or more coprocessor units. In some embodiments, multiple instances of processing unit 750 may be coupled to interconnect 760. Processing unit 750 (or each processor within processing unit 750) may contain a cache or other form of on-board memory. In some embodiments, processing unit 750 may be implemented as a general-purpose processing unit, and in other embodiments it may be implemented as a special purpose processing unit (e.g., an ASIC). In general, computing device 710 is not limited to any particular type of processing unit or processor subsystem.
As used herein, the terms “processing unit” or “processing element” refer to circuitry configured to perform operations or to a memory having program instructions stored therein that are executable by one or more processors to perform operations. Accordingly, a processing unit may be implemented as a hardware circuit implemented in a variety of ways. The hardware circuit may include, for example, custom very-large-scale integration (VLSI) circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A processing unit may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices, or the like. A processing unit may also be configured to execute program instructions or computer instructions from any suitable form of non-transitory computer-readable media to perform specified operations.
Storage subsystem 712 is usable by processing unit 750 (e.g., to store instructions executable by and data used by processing unit 750). Storage subsystem 712 may be implemented by any suitable type of physical memory media, including hard disk storage, floppy disk storage, removable disk storage, flash memory, random access memory (RAM-SRAM, EDO RAM, SDRAM, DDR SDRAM, RDRAM, etc.), ROM (PROM, EEPROM, etc.), and so on. Storage subsystem 712 may consist solely of volatile memory in some embodiments. Storage subsystem 712 may store program instructions executable by computing device 710 using processing unit 750, including program instructions executable to cause computing device 710 to implement the various techniques disclosed herein.
I/O interface 730 may represent one or more interfaces and may be any of various types of interfaces configured to couple to and communicate with other devices, according to various embodiments. In some embodiments, I/O interface 730 is a bridge chip from a front-side to one or more back-side buses. I/O interface 730 may be coupled to one or more I/O devices 740 via one or more corresponding buses or other interfaces. Examples of I/O devices include storage devices (hard disk, optical drive, removable flash drive, storage array, SAN, or an associated controller), network interface devices, user interface devices or other devices (e.g., graphics, sound, etc.).
It is noted that the computing device of FIG. 7 is one embodiment for demonstrating disclosed concepts. In other embodiments, various aspects of the computing device may be different. For example, in some embodiments, additional components, or multiple instances of the illustrated components may be included.
This specification includes references to “one embodiment,” “other embodiments,” “some embodiments,” or “an embodiment.” The appearances of these phrases do not necessarily refer to the same embodiment. Particular features, structures, or characteristics may be combined in any suitable manner consistent with this disclosure.
Various units, circuits, or other components may be described or claimed as “configured to” perform a task or tasks. In such contexts, “configured to” is used to connote structure by indicating that the units/circuits/components include structure (e.g., circuitry) that performs the task or tasks during operation. As such, the unit/circuit/component can be said to be configured to perform the task even when the specified unit/circuit/component is not currently operational (e.g., is not on). The units/circuits/components used with the “configured to” language include hardware—for example, circuits, memory storing program instructions executable to implement the operation, etc. Reciting that a unit/circuit/component is “configured to” perform one or more tasks is expressly intended not to invoke 35 U.S.C. § 112(f) for that unit/circuit/component.
As used herein, the term “based on” is used to describe one or more factors that affect a determination. This term does not foreclose the possibility that additional factors may affect the determination. That is, a determination may be solely based on specified factors or based on the specified factors as well as other, unspecified factors. Consider the phrase “determine A based on B.” This phrase specifies that B is a factor is used to determine A or that affects the determination of A. This phrase does not foreclose that the determination of A may also be based on some other factor, such as C. This phrase is also intended to cover an embodiment in which A is determined based solely on B. As used herein, the phrase “based on” is synonymous with the phrase “based at least in part on.”
This specification includes references to various embodiments, to indicate that the present disclosure is not intended to refer to one particular implementation, but rather a range of embodiments that fall within the spirit of the present disclosure, including the appended claims. Particular features, structures, or characteristics may be combined in any suitable manner consistent with this disclosure.
Although specific embodiments have been described above, these embodiments are not intended to limit the scope of the present disclosure, even where only a single embodiment is described with respect to a particular feature. Examples of features provided in the disclosure are intended to be illustrative rather than restrictive unless stated otherwise. The above description is intended to cover such alternatives, modifications, and equivalents as would be apparent to a person skilled in the art having the benefit of this disclosure.
The scope of the present disclosure includes any feature or combination of features disclosed herein (either explicitly or implicitly), or any generalization thereof, whether or not it mitigates any or all of the problems addressed herein. Accordingly, new claims may be formulated during prosecution of this application (or an application claiming priority thereto) to any such combination of features. In particular, with reference to the appended claims, features from dependent claims may be combined with those of the independent claims and features from respective independent claims may be combined in any appropriate manner and not merely in the specific combinations enumerated in the appended claims.

Claims (20)

What is claimed is:
1. A method, comprising:
generating, by a computing system, an authentication decision for a multi-factor authentication process for a first account, wherein generating the authentication decision includes communicating with a first mobile device as a factor in the multi-factor authentication process;
in response to a request to authorize participation of a second mobile device as a factor in the multi-factor authentication process for the first account, the computing system generating a secret and transmitting the secret to the first mobile device;
receiving, by the computing system, information from the second mobile device, wherein the information is generated based on capturing an image of a display by the first mobile device, wherein the display is based on the transmitted secret;
verifying, by the computing system, content of the information using the secret;
verifying, by the computing system, that the information is received within a determined time interval from transmitting the secret to the first mobile device;
based on the verification of the content and the time interval, authorizing participation of the second mobile device as a factor in the multi-factor authentication process for the first account; and
based on the authorizing, communicating with the second mobile device as a factor in a subsequent multi-factor authentication process for the first account.
2. The method of claim 1, further comprising:
verifying that the secret has not been used more than a threshold number of times, wherein the secret is a limited-use secret.
3. The method of claim 1, further comprising:
receiving, from the first mobile device, configuration information that indicates one or more parameters for use of the second mobile device in the multi-factor authentication process.
4. The method of claim 3, wherein the configuration information specifies whether both of the first and the second mobile devices are to participate in the multi-factor authentication process.
5. The method of claim 3, wherein the configuration information specifies a type of authentication to request from the second mobile device for the subsequent multi-factor authentication process.
6. The method of claim 1, wherein the display is an image of a two-dimensional pattern generated based on the secret.
7. The method of claim 1, wherein the authentication factor is a non-first factor of the multi-factor authentication process.
8. A non-transitory computer readable medium having instructions stored thereon that are capable of being executed by a computer system to perform operations comprising:
generating an authentication decision for a multi-factor authentication process for a first account, wherein generating the authentication decision includes communicating with a first mobile device as a factor in the multi-factor authentication process;
in response to a request to authorize participation of a second mobile device as a factor in the multi-factor authentication process for the first account, generating a secret and transmitting the secret to the first mobile device;
receiving information from the second mobile device, wherein the information is indicated as pertaining to the request to authorize participation of the second mobile device and is generated based on capturing an image of a display by the first mobile device, wherein the display is based on the transmitted secret;
verifying content of the information using the secret;
verifying that the information is received within a determined time interval from transmitting the secret to the first mobile device;
based on the verification of the content and the time interval, authorizing participation of the second mobile device as a factor in the multi-factor authentication process for the first account; and
based on the authorizing, communicating with the second mobile device as a factor in a subsequent multi-factor authentication process for the first account.
9. The non-transitory computer readable medium of claim 8, wherein the secret is a limited-use secret, wherein the operations further comprise verifying that the secret has not been used more than a threshold number of times.
10. The non-transitory computer readable medium of claim 8, wherein the operations further comprise:
receiving, from the first mobile device, configuration information that indicates one or more parameters for use of the second mobile device in the multi-factor authentication process.
11. The non-transitory computer readable medium of claim 10, wherein the configuration information specifies whether both of the first and the second mobile devices are to participate in the multi-factor authentication process.
12. The non-transitory computer readable medium of claim 10, wherein the configuration information specifies a type of authentication to request from the second mobile device for subsequent multi-factor authentication process.
13. The non-transitory computer readable medium of claim 8, wherein the display uses a display unit of the first mobile device and is an image of a two-dimensional code generated based on the secret.
14. The non-transitory computer readable medium of claim 8, wherein the authentication factor is a non-first factor of the multi-factor authentication process.
15. The non-transitory computer readable medium of claim 8, wherein the operations further comprise:
in response to a request to authorize participation of a third mobile device as a factor in the multi-factor authentication process, transmitting a second secret to the second mobile device;
receiving information from the third mobile device, wherein the information is indicated as having been generated based on capturing an image of a display by the second mobile device; and
verifying the information based on the second secret and the determined time interval.
16. The non-transitory computer readable medium of claim 8, wherein the secret is encrypted before it is sent to the first mobile device.
17. A non-transitory computer readable medium having instructions stored thereon that are capable of being executed by a computing device to:
capture an image of a visual pattern displayed by a mobile device to authorize participation of the computing device as a factor in a multi-factor authentication process for a first account, wherein the mobile device is previously authorized to participate as a factor in the multi-factor authentication process and wherein the visual pattern is based on a secret transmitted to the mobile device from an authentication server;
process the captured image and send information to the authentication server based on the captured image as evidence of physical proximity to the mobile device; and
based on verification by the authentication server of the information, receive a request as a factor in a subsequent multi-factor authentication process for the first account.
18. The non-transitory computer readable medium of claim 17, wherein the instructions are further executable to:
request authorization for participation of another mobile device in the multi-factor authentication process for the first account; and
display a visual pattern based on a secret received from the authentication server in response to the request.
19. The non-transitory computer readable medium of claim 17, wherein processing the captured image includes determining the secret based on the visual pattern, wherein the information includes the secret.
20. The non-transitory computer readable medium of claim 17, wherein the received request is a non-first factor in the multi-factor authentication process for the first account.
US15/985,913 2018-05-22 2018-05-22 Authorization of another device for participation in multi-factor authentication Active 2039-01-18 US10812476B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/985,913 US10812476B2 (en) 2018-05-22 2018-05-22 Authorization of another device for participation in multi-factor authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US15/985,913 US10812476B2 (en) 2018-05-22 2018-05-22 Authorization of another device for participation in multi-factor authentication

Publications (2)

Publication Number Publication Date
US20190364034A1 US20190364034A1 (en) 2019-11-28
US10812476B2 true US10812476B2 (en) 2020-10-20

Family

ID=68614152

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/985,913 Active 2039-01-18 US10812476B2 (en) 2018-05-22 2018-05-22 Authorization of another device for participation in multi-factor authentication

Country Status (1)

Country Link
US (1) US10812476B2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11108764B2 (en) 2018-07-02 2021-08-31 Salesforce.Com, Inc. Automating responses to authentication requests using unsupervised computer learning techniques
US20220174068A1 (en) * 2020-12-01 2022-06-02 Initial State Technologies, Inc. System and method for securely connecting a test and measurement instrument to a web service
US11429741B2 (en) 2020-12-04 2022-08-30 Salesforce.Com, Inc. Data security using multi-factor authentication
US12130896B2 (en) 2021-07-20 2024-10-29 The Toronto-Dominion Bank System and method for authorizing data transfers

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11171958B1 (en) * 2018-07-10 2021-11-09 United Services Automobile Association (Usaa) Secure session sharing between computing devices
CN108989441A (en) * 2018-07-27 2018-12-11 京东方科技集团股份有限公司 A kind of information interaction system and method
US20230336548A1 (en) * 2018-07-27 2023-10-19 Boe Technology Group Co., Ltd. System and method for information interaction
US10484377B1 (en) 2018-10-17 2019-11-19 Capital One Services, Llc Systems and methods for multi-device multi-factor authentication
US12022295B2 (en) * 2019-04-29 2024-06-25 Sonicwall Inc. Streamlined creation and expansion of a wireless mesh network
US11997635B2 (en) 2019-04-29 2024-05-28 Sonicwall Inc. Establishing simultaneous mesh node connections
US10972916B2 (en) 2019-04-29 2021-04-06 Sonicwall Inc. Instant secure wireless network setup
US12093371B2 (en) 2020-05-28 2024-09-17 Red Hat, Inc. Data distribution using a trusted execution environment in an untrusted device
US11971980B2 (en) 2020-05-28 2024-04-30 Red Hat, Inc. Using trusted execution environments to perform a communal operation for mutually-untrusted devices
US11947659B2 (en) 2020-05-28 2024-04-02 Red Hat, Inc. Data distribution across multiple devices using a trusted execution environment in a mobile device
US11848924B2 (en) * 2020-10-12 2023-12-19 Red Hat, Inc. Multi-factor system-to-system authentication using secure execution environments
US11811762B2 (en) 2021-02-05 2023-11-07 Cisco Technology, Inc. Sponsor delegation for multi-factor authentication
US11863549B2 (en) * 2021-02-08 2024-01-02 Cisco Technology, Inc. Adjusting security policies based on endpoint locations
US12081544B2 (en) * 2021-02-08 2024-09-03 Capital One Services, Llc Systems and methods for preventing unauthorized network access
US11805112B2 (en) 2021-02-08 2023-10-31 Cisco Technology, Inc. Enhanced multi-factor authentication based on physical and logical proximity to trusted devices and users
US12229301B2 (en) * 2021-05-05 2025-02-18 EMC IP Holding Company LLC Access control of protected data using storage system-based multi-factor authentication
US12333588B2 (en) * 2022-03-31 2025-06-17 Plaid Inc. Programming verification templates visually
US12265530B2 (en) 2023-01-31 2025-04-01 Salesforce, Inc. Automated data ingestion and processing
US12395535B2 (en) * 2023-01-31 2025-08-19 Salesforce, Inc. Security techniques for enterprise messaging systems

Citations (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5963646A (en) 1997-03-10 1999-10-05 The Pacid Group Secure deterministic encryption key generator system and method
US5995624A (en) 1997-03-10 1999-11-30 The Pacid Group Bilateral authentication and information encryption token system and method
US6049612A (en) 1997-03-10 2000-04-11 The Pacid Group File encryption method and system
US6105133A (en) 1997-03-10 2000-08-15 The Pacid Group Bilateral authentication and encryption system
US20030182194A1 (en) 2002-02-06 2003-09-25 Mark Choey Method and system of transaction card fraud mitigation utilizing location based services
US20060136334A1 (en) 2004-11-29 2006-06-22 Atkinson Steven P Electronic system for provision of banking services
US7104444B2 (en) 2001-03-14 2006-09-12 Hitachi, Ltd. Method and system to prevent fraudulent payment in credit/debit card transactions, and terminals therefor
US20060282500A1 (en) 2005-06-13 2006-12-14 Yutaka Kiuchi Information management method using a managing symbol and information management server
US20070055878A1 (en) 2005-02-14 2007-03-08 Tricipher, Inc Technique for providing multiple levels of security
US20070174082A1 (en) 2005-12-12 2007-07-26 Sapphire Mobile Systems, Inc. Payment authorization using location data
US7548886B2 (en) 2003-06-12 2009-06-16 International Business Machines Corporation System and method for early detection and prevention of identity theft
US20100006642A1 (en) 2008-07-08 2010-01-14 Boutcher David C Real-time security verification for banking cards
US7669760B1 (en) 2006-10-31 2010-03-02 United Services Automobile Association (Usaa) GPS validation for transactions
US20100100454A1 (en) 2000-09-25 2010-04-22 Sines Randy D Methods for performing internet processes using global positioning and other means
US20100174649A1 (en) 2007-06-04 2010-07-08 Bce Inc. Methods and systems for validating online transactions using location information
US20100186074A1 (en) * 2009-01-16 2010-07-22 Angelos Stavrou Authentication Using Graphical Passwords
US20100217880A1 (en) 2009-02-25 2010-08-26 Nightingale Group, LLC Information request and access
US7801304B1 (en) 1981-11-03 2010-09-21 Personalized Media Communications, Llc Signal processing apparatus and methods
US20100293598A1 (en) 2007-12-10 2010-11-18 Deluxe Digital Studios, Inc. Method and system for use in coordinating multimedia devices
US20100299529A1 (en) 2009-03-25 2010-11-25 Pacid Technologies, Llc Method and system for securing communication
US7860131B1 (en) 1981-11-03 2010-12-28 Personalized Media Communications, Llc Signal processing apparatus and methods
US20110007901A1 (en) 2008-12-26 2011-01-13 Yoichi Ikeda Communication device
US20110047597A1 (en) 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for security data collection and analysis
US20110142234A1 (en) 2009-12-15 2011-06-16 Michael Leonard Rogers Multi-Factor Authentication Using a Mobile Phone
US20110202466A1 (en) 2008-10-17 2011-08-18 Carter Robert A Multifactor Authentication
US20110219230A1 (en) 2010-03-03 2011-09-08 Jon Oberheide System and method of notifying mobile devices to complete transactions
US20110307707A1 (en) 2009-03-25 2011-12-15 Pacid Technologies, Llc Method and system for securing a file
US20110307705A1 (en) 2009-03-25 2011-12-15 Pacid Technologies, Llc System and method for protecting secrets file
US20110307699A1 (en) 2009-03-25 2011-12-15 Pacid Technologies, Llc Token for securing communication
US20110314281A1 (en) 2009-03-25 2011-12-22 Pacid Technologies, Llc Method and system for securing communication
US20110312278A1 (en) 2009-11-30 2011-12-22 Yosuke Matsushita Mobile communication device, communication method, integrated circuit, and program
US20120066745A1 (en) 2010-09-11 2012-03-15 At&T Intellectual Property I, L.P. Association of Multiple Public User Identifiers to Disparate Applications in an End-User's Device
US20120068812A1 (en) 2010-09-17 2012-03-22 Kazuyuki Yamamoto Information processing apparatus, information processing system, information processing method, and program
US20120096277A1 (en) 2009-04-20 2012-04-19 Alter Core, S.L. System and method for personal authentication using a mobile device
US20120110329A1 (en) 2010-10-29 2012-05-03 Jeremy Ray Brown Techniques for mobile device authentication
US20120144468A1 (en) 2010-12-07 2012-06-07 James Pratt Systems, Methods, and Computer Program Products for User Authentication
US20120159591A1 (en) 2010-12-15 2012-06-21 Charles Andrew Payne User Authentication Via Mobile Communication Device With Imaging System
US20120158821A1 (en) 2010-12-15 2012-06-21 Sap Ag Service delivery framework
US20120280784A1 (en) 2011-05-03 2012-11-08 Verizon Patent And Licensing Inc. Facility management using mobile devices
US20130191884A1 (en) 2012-01-20 2013-07-25 Interdigital Patent Holdings, Inc. Identity management with local functionality
US8627438B1 (en) 2011-09-08 2014-01-07 Amazon Technologies, Inc. Passwordless strong authentication using trusted devices
US20140189808A1 (en) 2012-12-28 2014-07-03 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
US8806567B1 (en) 2010-12-16 2014-08-12 Juniper Networks, Inc. Using encoded identifiers to provide rapid configuration for network access
US8861724B2 (en) * 2010-09-30 2014-10-14 Google Inc. Image-based key exchange
US20140317713A1 (en) * 2012-09-02 2014-10-23 Mpayme Ltd. Method and System of User Authentication Using an Out-of-band Channel
US20140378063A1 (en) 2013-06-20 2014-12-25 Research In Motion Limited Behavior Based on Paired Device Identification
US8955063B2 (en) 2007-09-10 2015-02-10 Nec Corporation Terminal device authentication method, terminal device and program
EP2992663B1 (en) * 2013-04-30 2020-01-01 Assa Abloy AB Method for mobile provisioning of nfc credentials
EP3246839B1 (en) * 2016-05-18 2020-07-01 Bundesdruckerei GmbH Access control with a mobile radio device

Patent Citations (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7908638B1 (en) 1981-11-03 2011-03-15 Personalized Media Communications LLC Signal processing apparatus and methods
US7801304B1 (en) 1981-11-03 2010-09-21 Personalized Media Communications, Llc Signal processing apparatus and methods
US7805749B1 (en) 1981-11-03 2010-09-28 Personalized Media Communications, Llc Signal processing apparatus and methods
US7860131B1 (en) 1981-11-03 2010-12-28 Personalized Media Communications, Llc Signal processing apparatus and methods
US6105133A (en) 1997-03-10 2000-08-15 The Pacid Group Bilateral authentication and encryption system
US5963646A (en) 1997-03-10 1999-10-05 The Pacid Group Secure deterministic encryption key generator system and method
US6049612A (en) 1997-03-10 2000-04-11 The Pacid Group File encryption method and system
US5995624A (en) 1997-03-10 1999-11-30 The Pacid Group Bilateral authentication and information encryption token system and method
US20100100454A1 (en) 2000-09-25 2010-04-22 Sines Randy D Methods for performing internet processes using global positioning and other means
US7104444B2 (en) 2001-03-14 2006-09-12 Hitachi, Ltd. Method and system to prevent fraudulent payment in credit/debit card transactions, and terminals therefor
US20030182194A1 (en) 2002-02-06 2003-09-25 Mark Choey Method and system of transaction card fraud mitigation utilizing location based services
US7548886B2 (en) 2003-06-12 2009-06-16 International Business Machines Corporation System and method for early detection and prevention of identity theft
US20060136334A1 (en) 2004-11-29 2006-06-22 Atkinson Steven P Electronic system for provision of banking services
US20070055878A1 (en) 2005-02-14 2007-03-08 Tricipher, Inc Technique for providing multiple levels of security
US20060282500A1 (en) 2005-06-13 2006-12-14 Yutaka Kiuchi Information management method using a managing symbol and information management server
US20070174082A1 (en) 2005-12-12 2007-07-26 Sapphire Mobile Systems, Inc. Payment authorization using location data
US7669760B1 (en) 2006-10-31 2010-03-02 United Services Automobile Association (Usaa) GPS validation for transactions
US20100174649A1 (en) 2007-06-04 2010-07-08 Bce Inc. Methods and systems for validating online transactions using location information
US8955063B2 (en) 2007-09-10 2015-02-10 Nec Corporation Terminal device authentication method, terminal device and program
US20100293598A1 (en) 2007-12-10 2010-11-18 Deluxe Digital Studios, Inc. Method and system for use in coordinating multimedia devices
US20100006642A1 (en) 2008-07-08 2010-01-14 Boutcher David C Real-time security verification for banking cards
US20110202466A1 (en) 2008-10-17 2011-08-18 Carter Robert A Multifactor Authentication
US20110047597A1 (en) 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for security data collection and analysis
US20110007901A1 (en) 2008-12-26 2011-01-13 Yoichi Ikeda Communication device
US20100186074A1 (en) * 2009-01-16 2010-07-22 Angelos Stavrou Authentication Using Graphical Passwords
US20100217880A1 (en) 2009-02-25 2010-08-26 Nightingale Group, LLC Information request and access
US20110307705A1 (en) 2009-03-25 2011-12-15 Pacid Technologies, Llc System and method for protecting secrets file
US20110307707A1 (en) 2009-03-25 2011-12-15 Pacid Technologies, Llc Method and system for securing a file
US20100299529A1 (en) 2009-03-25 2010-11-25 Pacid Technologies, Llc Method and system for securing communication
US20110307706A1 (en) 2009-03-25 2011-12-15 Pacid Technologies, Llc Method and system for securing communication
US20110307699A1 (en) 2009-03-25 2011-12-15 Pacid Technologies, Llc Token for securing communication
US20110314281A1 (en) 2009-03-25 2011-12-22 Pacid Technologies, Llc Method and system for securing communication
US20120096277A1 (en) 2009-04-20 2012-04-19 Alter Core, S.L. System and method for personal authentication using a mobile device
US20110312278A1 (en) 2009-11-30 2011-12-22 Yosuke Matsushita Mobile communication device, communication method, integrated circuit, and program
US20110142234A1 (en) 2009-12-15 2011-06-16 Michael Leonard Rogers Multi-Factor Authentication Using a Mobile Phone
US20110219230A1 (en) 2010-03-03 2011-09-08 Jon Oberheide System and method of notifying mobile devices to complete transactions
US20120066745A1 (en) 2010-09-11 2012-03-15 At&T Intellectual Property I, L.P. Association of Multiple Public User Identifiers to Disparate Applications in an End-User's Device
US20120068812A1 (en) 2010-09-17 2012-03-22 Kazuyuki Yamamoto Information processing apparatus, information processing system, information processing method, and program
US8861724B2 (en) * 2010-09-30 2014-10-14 Google Inc. Image-based key exchange
US20120110329A1 (en) 2010-10-29 2012-05-03 Jeremy Ray Brown Techniques for mobile device authentication
US20120144468A1 (en) 2010-12-07 2012-06-07 James Pratt Systems, Methods, and Computer Program Products for User Authentication
US20120159591A1 (en) 2010-12-15 2012-06-21 Charles Andrew Payne User Authentication Via Mobile Communication Device With Imaging System
US20120158821A1 (en) 2010-12-15 2012-06-21 Sap Ag Service delivery framework
US8806567B1 (en) 2010-12-16 2014-08-12 Juniper Networks, Inc. Using encoded identifiers to provide rapid configuration for network access
US20120280784A1 (en) 2011-05-03 2012-11-08 Verizon Patent And Licensing Inc. Facility management using mobile devices
US8627438B1 (en) 2011-09-08 2014-01-07 Amazon Technologies, Inc. Passwordless strong authentication using trusted devices
US20130191884A1 (en) 2012-01-20 2013-07-25 Interdigital Patent Holdings, Inc. Identity management with local functionality
US20140317713A1 (en) * 2012-09-02 2014-10-23 Mpayme Ltd. Method and System of User Authentication Using an Out-of-band Channel
US20140189808A1 (en) 2012-12-28 2014-07-03 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
EP2992663B1 (en) * 2013-04-30 2020-01-01 Assa Abloy AB Method for mobile provisioning of nfc credentials
US20140378063A1 (en) 2013-06-20 2014-12-25 Research In Motion Limited Behavior Based on Paired Device Identification
EP3246839B1 (en) * 2016-05-18 2020-07-01 Bundesdruckerei GmbH Access control with a mobile radio device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Google 2-step Verification, Article published Dec. 20, 2013 as verified by Internet Archive (4 pages); http://web.archive.org/web/20131220004531/http://www.google.com/landing/2step/#tab=why-you-need-it/ [Retrieved Apr. 23, 2018].

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11108764B2 (en) 2018-07-02 2021-08-31 Salesforce.Com, Inc. Automating responses to authentication requests using unsupervised computer learning techniques
US12301555B2 (en) 2018-07-02 2025-05-13 Salesforce, Inc. Automating responses to authentication requests using unsupervised computer learning techniques
US20220174068A1 (en) * 2020-12-01 2022-06-02 Initial State Technologies, Inc. System and method for securely connecting a test and measurement instrument to a web service
US12143388B2 (en) * 2020-12-01 2024-11-12 Initial State Technologies, Inc. System and method for securely connecting a test and measurement instrument to a web service
US11429741B2 (en) 2020-12-04 2022-08-30 Salesforce.Com, Inc. Data security using multi-factor authentication
US11899813B2 (en) 2020-12-04 2024-02-13 Salesforce, Inc. Data security using multi-factor authentication
US12353587B2 (en) 2020-12-04 2025-07-08 Salesforce, Inc. Data security using multi-factor authentication
US12130896B2 (en) 2021-07-20 2024-10-29 The Toronto-Dominion Bank System and method for authorizing data transfers

Also Published As

Publication number Publication date
US20190364034A1 (en) 2019-11-28

Similar Documents

Publication Publication Date Title
US10812476B2 (en) Authorization of another device for participation in multi-factor authentication
US10673843B2 (en) System and method for authentication service
US10326761B2 (en) Web-based user authentication techniques and applications
JP6648110B2 (en) System and method for authenticating a client to a device
EP3824592B1 (en) Public-private key pair protected password manager
CN110334498B (en) Method for unlocking one device by using the other device
US9781105B2 (en) Fallback identity authentication techniques
KR101666374B1 (en) Method, apparatus and computer program for issuing user certificate and verifying user
US20210390537A1 (en) Authentication and personal data sharing for partner services using out-of-band optical mark recognition
JP7798572B2 (en) Systems and methods for efficient challenge-response authentication
US20200067705A1 (en) Methods, apparatuses, and computer program products for frictionless electronic signature management
CN113302894A (en) Secure account access
US20130023240A1 (en) System and method for transaction security responsive to a signed authentication
US9294474B1 (en) Verification based on input comprising captured images, captured audio and tracked eye movement
US20230262057A1 (en) Systems and methods for authenticating users within a computing or access control environment
KR101451359B1 (en) User account recovery
US20210211419A1 (en) Provisioning a device to be an authentication device
US20150109428A1 (en) System and method for facial recognition
CN107079034A (en) A kind of identity authentication method, terminal device, certificate server and electronic equipment
CN105959287A (en) Biological feature based safety certification method and device
US9639825B1 (en) Securing multifactor authentication
US20220116390A1 (en) Secure two-way authentication using encoded mobile image
US20180343247A1 (en) Method, user terminal and authentication service server for authentication
US12231555B2 (en) Authentication and validation procedure for improved security in communications systems
US9413533B1 (en) System and method for authorizing a new authenticator

Legal Events

Date Code Title Description
AS Assignment

Owner name: SALESFORCE.COM, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALEXANDER, JOSHUA DAVID;REEL/FRAME:045870/0607

Effective date: 20180522

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

AS Assignment

Owner name: SALESFORCE, INC., CALIFORNIA

Free format text: CHANGE OF NAME;ASSIGNOR:SALESFORCE.COM, INC.;REEL/FRAME:069717/0333

Effective date: 20220325